default search action
P. Deepa Shenoy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c28]K. Kiran, Chalke Saurabh S, Mohammad Usman, P. Deepa Shenoy, K. R. Venugopal:
Anonymity and Performance Analysis of Stream Isolation in Tor Network. ICCCNT 2019: 1-6 - 2018
- [j7]Vandana Jha, Savitha R, P. Deepa Shenoy, K. R. Venugopal, Arun Kumar Sangaiah:
A novel sentiment aware dictionary for multi-domain sentiment classification. Comput. Electr. Eng. 69: 585-597 (2018) - [c27]K. Kiran, N. P. Kaushik, S. Sharath, P. Deepa Shenoy, K. R. Venugopal, Vignesh T. Prabhu:
Experimental Evaluation of BATMAN and BATMAN-Adv Routing Protocols in a Mobile Testbed. TENCON 2018: 1538-1543 - 2017
- [j6]Asha S. Manek, P. Deepa Shenoy, M. Chandra Mohan, K. R. Venugopal:
Aspect term extraction for sentiment analysis in large movie reviews using Gini Index feature selection method and SVM classifier. World Wide Web 20(2): 135-154 (2017) - 2016
- [j5]Asha S. Manek, P. Deepa Shenoy, M. Chandra Mohan, K. R. Venugopal:
Detection of fraudulent and malicious websites by analysing user reviews for online shopping websites. Int. J. Knowl. Web Intell. 5(3): 171-189 (2016) - [c26]U. Prathap, P. Deepa Shenoy, K. R. Venugopal:
PCAD: Power control attack detection in wireless sensor networks. ANTS 2016: 1-6 - [c25]Vandana Jha, Savitha R, P. Deepa Shenoy, K. R. Venugopal:
Reputation System: Evaluating Reputation among All Good Sellers. WASSA@NAACL-HLT 2016: 115-121 - 2015
- [c24]Vandana Jha, N. Manjunath, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
HOMS: Hindi opinion mining system. ReTIS 2015: 366-371 - 2014
- [c23]Asha S. Manek, V. Sumithra, P. Deepa Shenoy, M. Chandra Mohan, K. R. Venugopal, L. M. Patnaik:
DeMalFier: Detection of Malicious web pages using an effective classifier. ICDSE 2014: 83-88 - [i2]J. S. Saleema, N. Bhagawathi, S. Monica, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Cancer Prognosis Prediction Using Balanced Stratified Sampling. CoRR abs/1403.2950 (2014) - 2013
- [j4]Chetana Hegde, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Authentication using Finger Knuckle Prints. Signal Image Video Process. 7(4): 633-645 (2013) - [i1]R. H. Vishwanath, S. Leena, K. C. Srikantaiah, K. Shreekrishna Kumar, P. Deepa Shenoy, K. R. Venugopal, S. S. Iyengar, Lalit M. Patnaik:
Forecasting Stock Time-Series using Data Approximation and Pattern Sequence Similarity. CoRR abs/1309.2517 (2013) - 2011
- [j3]Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Heartbeat biometrics for human authentication. Signal Image Video Process. 5(4): 485-493 (2011) - [c22]Anita Kanavalli, N. Chandra Kiran, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
An Efficient Protocol to Study the Effect of Flooding on Energy Consumption in MANETS. ACC (1) 2011: 141-152 - [c21]Veena H. Bhat, Prasanth G. Rao, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
An Efficient Framework for Prediction in Healthcare Data Using Soft Computing Techniques. ACC (3) 2011: 522-532 - [c20]N. Chandrakant, A. P. Bijil, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Middleware Service Oriented Rescue and Crime Information System (RCIS) Using Heterogeneous Fixed Nodes in WSNs. ADCONS 2011: 389-398 - [c19]Chetana Hegde, J. Phanindra, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Human authentication using finger knuckle print. Bangalore Compute Conf. 2011: 9 - [c18]N. Chandrakant, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Restricting the admission of selfish or malicious nodes into the network by using efficient security services in middleware for MANETs. ICCCS 2011: 489-492 - [c17]Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Steganalysis of Perturbed Quantization Using HBCL Statistics and FR Index. ICISTM 2011: 51-60 - [c16]Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Statistical Analysis for Human Authentication Using ECG Waves. ICISTM 2011: 287-298 - 2010
- [c15]Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
JHUF-5 Steganalyzer: Huffman Based Steganalytic Features for Reliable Detection of YASS in JPEG Images. FGIT-SIP/MulGraB 2010: 87-97 - [c14]Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Human Authentication Based on ECG Waves Using Radon Transform. FGIT-SecTech/DRBC 2010: 197-206 - [c13]Anita Kanavalli, T. L. Geetha, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Preserving Energy Using Link Protocol in Wireless Networks. FGIT-FGCN (2) 2010: 370-380 - [c12]N. Chandrakant, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens. FGIT-FGCN (2) 2010: 441-449 - [c11]Veena H. Bhat, S. Krishna, P. Deepa Shenoy:
SURF: Steganalysis using random forests. ISDA 2010: 373-378 - [c10]Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
JPEG Steganalysis Using HBCL Statistics and FR Index. PAISI 2010: 105-112 - [c9]Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index. SECRYPT 2010: 447-452
2000 – 2009
- 2009
- [c8]Veena H. Bhat, Prasanth G. Rao, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
An Efficient Prediction Model for Diabetic Database Using Soft Computing Techniques. RSFDGrC 2009: 328-335 - 2008
- [c7]Anita Kanavalli, L. V. Udaya Ranga, A. G. Sathish, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Proactive sliding -window strategy for merging sensor-enabled cars. ICON 2008: 1-5 - 2007
- [c6]L. Vibha, G. M. Harshavardhan, K. Pranaw, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Lesion detection using segmentation and classification of mammograms. Artificial Intelligence and Applications 2007: 342-347 - 2006
- [j2]K. G. Srinivasa, Karthik Sridharan, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
A neural network based CBIR system using STI features and relevance feedback. Intell. Data Anal. 10(2): 121-137 (2006) - [c5]L. Vibha, G. M. Harshavardhan, K. Pranaw, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Classification of Mammograms Using Decision Trees. IDEAS 2006: 263-266 - 2005
- [j1]P. Deepa Shenoy, K. G. Srinivasa, K. R. Venugopal, Lalit M. Patnaik:
Dynamic Association Rule Mining using Genetic Algorithms. Intell. Data Anal. 9(5): 439-453 (2005) - [c4]K. G. Srinivasa, Karthik Sridharan, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
A Dynamic Migration Model for Self-adaptive Genetic Algorithms. IDEAL 2005: 555-562 - 2004
- [c3]P. Deepa Shenoy, K. G. Srinivasa, Achint Oommen Thomas, K. R. Venugopal, Lalit M. Patnaik:
Mining Top - k Ranked Webpages Using Simulated Annealing and Genetic Algorithms. AACC 2004: 137-144 - 2003
- [c2]P. Deepa Shenoy, K. G. Srinivasa, M. P. Mithun, K. R. Venugopal, Lalit M. Patnaik:
Dynamic Subspace Clustering for Very Large High-Dimensional Databases. IDEAL 2003: 850-854 - [c1]P. Deepa Shenoy, K. G. Srinivasa, K. R. Venugopal, Lalit M. Patnaik:
Evolutionary Approach for Mining Association Rules on Dynamic Databases. PAKDD 2003: 325-336
Coauthor Index
aka: L. M. Patnaik
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint